Sciweavers

3899 search results - page 740 / 780
» Argumentation for Access Control
Sort
View
ADHOCNOW
2005
Springer
14 years 1 months ago
MIMOMAN: A MIMO MAC Protocol for Ad Hoc Networks
Multiple-Input Multiple-Output (MIMO) antenna systems present a radical way to improve the performance of wireless communications. Such systems can be utilized in wireless ad hoc n...
Joon-Sang Park, Mario Gerla
CCS
2005
ACM
14 years 1 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
EURONGI
2005
Springer
14 years 1 months ago
Receiver Oriented Trajectory Based Forwarding
Abstract— Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requ...
Antonio Capone, Ilario Filippini, Luigi Fratta, Lu...
HPCC
2005
Springer
14 years 1 months ago
An Energy-Efficient Uni-scheduling Based on S-MAC in Wireless Sensor Network
S-MAC is a MAC (Medium Access Control) protocol as specialized for the wireless sensor network in order to sacrifice transmission delay and extend the working life of the whole sen...
Tae-Seok Lee, Yuan Yang, Ki-Jeong Shin, Myong-Soon...